US20210097476A1 - Container Management Method, Apparatus, and Device - Google Patents

Container Management Method, Apparatus, and Device Download PDF

Info

Publication number
US20210097476A1
US20210097476A1 US17/117,698 US202017117698A US2021097476A1 US 20210097476 A1 US20210097476 A1 US 20210097476A1 US 202017117698 A US202017117698 A US 202017117698A US 2021097476 A1 US2021097476 A1 US 2021097476A1
Authority
US
United States
Prior art keywords
container
container image
user
identifier
information database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US17/117,698
Inventor
Wenqiang Ding
Juan Li
Qishuai Xu
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of US20210097476A1 publication Critical patent/US20210097476A1/en
Assigned to HUAWEI TECHNOLOGIES CO., LTD. reassignment HUAWEI TECHNOLOGIES CO., LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LI, JUAN, XU, Qishuai, DING, WENQIANG
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N21/00Investigating or analysing materials by the use of optical means, i.e. using sub-millimetre waves, infrared, visible or ultraviolet light
    • G01N21/84Systems specially adapted for particular applications
    • G01N21/88Investigating the presence of flaws or contamination
    • G01N21/90Investigating the presence of flaws or contamination in a container or its contents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45562Creating, deleting, cloning virtual machine instances
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • G06F8/63Image based installation; Cloning; Build to order

Definitions

  • This application relates to the field of computer technologies, and in particular, to a container management method, apparatus, and device.
  • a container technology is a lightweight virtualization technology used to share server resources.
  • a container may provide a virtual execution environment for a process, and one virtual execution environment is one container.
  • a container image is a read-only special file system that provides a program, a library, a resource, and a configuration required for running a container, and does not include any dynamic data.
  • a container management system may distribute and run a container based on a container image, or convert a container into a container image and save the container image.
  • the container management system is loaded on a host.
  • the container management system may provision a container for a user, and provide, on the host, storage space for storing a container image for the user.
  • the user may customize the container image and store the container image in the storage space, and another user may download the container image and start the container.
  • the container management system provisions the container
  • the user may not only obtain the container image stored by the user, but also obtain a container image stored by another user. This may result in leakage of user data and cause the security problem.
  • This application provides a container management method, apparatus, and device, to overcome the security problem in the conventional technology.
  • this application provides a container management method, including: obtaining a container provisioning request, wherein the container provisioning request is a request used to provision a first container based on a first container image, and the container provisioning request carries an identifier of the first container image and an identifier of a first user; and querying a container image information database corresponding to the identifier of the first user.
  • the container image information database is used to store a mapping relationship between the identifier of the first user and the first container image. Therefore, when the identifier of the first container image exists in the container image information database, the first container image is obtained based on the identifier of the first container image. In this way, the first container is provisioned based on the first container image.
  • the container image information database of the first user is queried, but a container image information database of another user is not queried. In this case, a container image of another user is not obtained.
  • This implements user-level isolation of user data in the container provisioning process, and ensures security of the user data.
  • the container image information database is registered and created, and the identifier of the first user is further obtained during registration.
  • the container image information database is used to store one or more identifiers of one or more container images associated with the identifier of the first user. If the first container image is one of the one or more container images associated with the identifier of the first user, the container image information database includes the identifier of the first container image. Registering and creating the container image information database can ensure a correspondence between the container image information database and the identifier of the first user, and further ensure the security of the user data of the first user because the container image information database of the first user cannot be obtained based on an identifier of the another user.
  • information about the first container image is obtained based on the identifier of the first container image.
  • the information about the first container image may be included in the container image information database, or may be included in another information set.
  • the information about the first container image can be obtained based on the identifier of the first container image.
  • the first container image can be obtained based on the information about the first container image.
  • the first container image may be stored in local storage space. This obtaining manner ensures the security of the user data.
  • the first container image when the identifier of the first container image that is carried in the container provisioning request is not included in the container image information database, the first container image may be further obtained from a container image repository based on an attribute of the first container image.
  • the container image repository is a private container image repository of the first user; or when the attribute of the first container image is public, the container image repository is a public container image repository. Storage locations of the private container image repository of the first user and the public container image repository may not be in the local storage space, for example, may be stored in a cloud. This facilitates centralized management of container images.
  • the container images are separately stored based on attributes (public or private) of the container images to facilitate subsequent search and isolation. This further ensures the security of the user data.
  • the method may further include: generating a second container image based on the first container, where the second container image may be the same as or different from the first container image, and the second container image includes information about the first user, an application, and/or a driver; adding an identifier of the second container image to the container image information database, to be specific, associating the identifier of the second container image with the identifier of the first user in the container image information database; and uploading the second container image to the private container image repository of the first user, and to provision a container. This isolates different user data and ensures the security of the user data.
  • an authentication result may be further obtained based on the identifier of the first user.
  • an operation of querying the container image information database is performed.
  • An authentication operation may further improve the security of the user data in the container management method by using a strict authentication algorithm.
  • this application provides a container management apparatus.
  • the apparatus includes modules configured to perform the container management apparatus in any one of the first aspect or the possible implementations of the first aspect.
  • a container management device includes a processor and a memory, the memory stores at least one instruction, and the processor loads and executes the instruction to implement any container management method described above.
  • a computer-readable storage medium stores at least one instruction, and a processor loads and executes the instruction to implement any container management method described above.
  • a computer program product including an instruction is provided.
  • the computer program product runs on a computer, the computer is enabled to perform any container management method described above.
  • a container image information database corresponding to an identifier of a user is queried. After an identifier of a container image is found from the container image information database of the user, the container image is obtained based on the identifier of the container image, and a container is further provisioned based on the container image.
  • a container provisioning process the container image information database of the user is queried, but a container image information database of another user is not queried. In this case, a container image of another user is not obtained. This implements user-level isolation of user data in the container provisioning process, and ensures security of the user data.
  • FIG. 1 is a schematic diagram of a storage form of a container image in a conventional technology
  • FIG. 2 is an architectural diagram of a system in a container management method according to an embodiment of the present application
  • FIG. 3 is a schematic diagram of a container image information database in a container management method according to an embodiment of the present application
  • FIG. 4 is a flowchart of a container management method according to an embodiment of the present application.
  • FIG. 5 is a flowchart of a container management method according to an embodiment of the present application.
  • FIG. 6 is an architectural diagram of a system in a container management method according to an embodiment of the present application.
  • FIG. 7A and FIG. 7B are a flowchart of a container management method according to an embodiment of the present application.
  • FIG. 8 is a flowchart of a container management method according to an embodiment of the present application.
  • FIG. 9 is a structural block diagram of a container management apparatus according to an embodiment of the present application.
  • FIG. 10 is a structural block diagram of a container management apparatus according to an embodiment of the present application.
  • FIG. 11 is a structural block diagram of a container management device according to an embodiment of the present application.
  • a container technology is a lightweight virtualization technology used to share server resources.
  • the container technology may provide a virtual execution environment for a process, and one container provides one virtual execution environment.
  • the virtual execution environment may be bound to a specific central processing unit (CPU) and a memory node, allocate a specific proportion of CPU time and a specific proportion of input/output (IO) time, limit available memory size, and provide device access control.
  • CPU central processing unit
  • IO input/output
  • the container is more lightweight, easier to distribute, and has higher performance and lower losses.
  • a container image is a read-only special file system that provides a program, a library, a resource, and a configuration required for running a container, and does not include any dynamic data.
  • the container image includes one or more of the following information: information about a user, an application, and a driver.
  • the container image is a layered structure and includes a plurality of layers of read-only data.
  • the plurality of layers include one or more of the following layers: a base image layer, an application program layer, a user-defined layer, and the like.
  • a plurality of read-only layers may be integrated into one container image by using a union file system (UFS) technology.
  • UFS union file system
  • the container is an instance created based on the container image.
  • the instance is an object that includes a user configuration and a running configuration required for implementing a function of the container image.
  • Provisioning the container based on the container image may be adding a read/write layer based on the read-only layers of the container image, and integrating the plurality of read-only layers and the read/write layer into one container by using a union mount (UM) technology.
  • the container is classified into an application container and a system container based on different application scenarios.
  • the application container is used to orchestrate and schedule a stateless application, and an application container image includes an application and a running environment configuration.
  • the system container is used to orchestrate and schedule computing resources such as a CPU, a memory, and a storage resource.
  • the system container has a full operating system (OS) environment, supports a stateful application, and can provide dynamic resource allocation.
  • OS operating system
  • a computing service system that provides a computing service generally includes a management host configured to manage the provided computing service and a service host that provides a specific computing service.
  • the computing service system may further include a storage host, and the storage host is configured to store related data of the provided computing service.
  • a container management system is installed on one service host, to provision a container running on the service host for a user, and provide local storage space for storing a container image for the user on the service host.
  • the local storage space of the service host may store a plurality of container images of one or more users. Attributes of the container image may be public and private.
  • a container image whose attribute is public is referred to as a public container image, and means that the container image is a container image open to all users.
  • a container image whose attribute is private is referred to as a private container image, and means that the container image is a private container image of a user.
  • the user may specify whether the private container image is open to all users.
  • a container image A and a container image B of a first user, and the container image B and a container image C of a second user are stored on a service host.
  • the container image B is a public container image
  • the container image A is a private container image of the first user
  • the container images of the first user and the container images of the second user may be obtained from local storage space of the service host.
  • the container may be provisioned based on the container image A, the container image B, or the container image C.
  • the second user provisions a container by using the container management system, a case is similar to that of the first user, and details are not described herein. It can be learned that the conventional container management system cannot implement isolation of container images of different users on the service host. This is not conducive to protecting security of user data.
  • the container management solution may provide a container management solution for a user based on an infrastructure as a service (IaaS), and the IaaS may provide a computing service, for example, a cloud computing service, based on a complete computer infrastructure.
  • IaaS infrastructure as a service
  • computing service for example, a cloud computing service
  • FIG. 2 shows a system architecture of a cloud service management system according to an embodiment of the present application.
  • the system architecture includes a service host, a management host, and a storage host.
  • the service host is configured to provide a specific cloud computing service
  • the management host is configured to manage the provided cloud computing service
  • the storage host is configured to store related data of the provided cloud computing service.
  • the service host, the management host, and the storage host may be a same physical host or virtual host, or may be different physical hosts or virtual hosts.
  • the physical host or the virtual host may be a host in an IaaS computing resource pool.
  • a container management system runs in the cloud service management system, and the container management system includes at least a container engine and a container image repository.
  • the system architecture shown in FIG. 2 is used as an example. At least a computing control module of the cloud service management system, and the container engine and the container image repository of the container management system are deployed on the service host. At least an authentication module of the cloud service management system is deployed on the management host. At least the container image repository of the container management system is deployed on the storage host.
  • the container image repository includes a public container image repository and a private container image repository.
  • the cloud service management system in this embodiment of the present application may include another service host on which the computing control module and the container engine are deployed.
  • a deployment manner of modules of the container management system on the service host, the management host, and the storage host is not limited to the foregoing examples.
  • the computing control module is configured to deploy cloud computing, including instance running, network management, user control, and the like.
  • the authentication module is a module used to manage identity authentication, a service rule, and a token function.
  • the container engine is used for container-related management, container-related user management, and the like.
  • the container image repository is used to store and distribute a container image, and includes the public container image repository and the private container image repository.
  • local storage space of the service host stores one or more container images of a user, and the user is a user that registers with the container engine on the service host.
  • the one or more container images may be downloaded from the public container image repository in the container image repository or a private container image repository of the user, or may be obtained by converting a container on the service host.
  • the container image information database includes an identifier of a container image associated with an identifier of the user in the local storage space of the service host.
  • Information about the container image may be further obtained based on the identifier of the container image, and the information about the container image includes one or more of the following information: an attribute of the container image and storage location information of the container image, for example, storage index information.
  • the information about the container image may be included in the container image information database of the user, or may be stored in other information storage space or included in another information set. However, regardless of where the information is stored, the information may be found according to a mapping relationship between the identifier of the container image and the information about the container image.
  • the identifier of the user may be an identification (ID) of the user and/or a token (token) of the user.
  • the identifier of the container image may be an ID of the container image and/or a name of the container image. It should be noted that the user has a permission to query the container image information database of the user, but does not have a permission to query a container image information database of another user.
  • FIG. 3 shows an example of a container image information database of a user.
  • a container image information database of a first user includes an identifier of a container image A and an identifier of a container image B.
  • a container image information database of a second user includes the identifier of the container image B and an identifier of a container image C.
  • the container image B is a public container image
  • the container image A is a private container image of the first user
  • the container image C is a private container image of the second user.
  • the container image A includes a layer A 1 , a layer A 2 , and a layer B
  • the container image B includes the layer B
  • the container image C includes the layer B and a layer C.
  • the layer A 1 is a user-defined layer of the first user
  • the layer A 2 is an application program layer of the first user
  • the layer B is a public base image layer
  • the layer C is a user-defined layer of the second user.
  • the container image information databases further include storage index information of the layer A 1 , the layer A 2 , and the layer B of the container image A, storage index information of the layer B of the container image B, and the storage index information of the layer B and storage index information of the layer C of the container image C.
  • the container image information database of the first user in a service host includes an identifier of a container image associated with an identifier of the first user
  • the container image information database of the second user includes an identifier of a container image associated with an identifier of the second user.
  • FIG. 4 shows a flowchart of a container management method according to an embodiment of the present application. The method is used to manage a container provisioning process and includes the following steps.
  • Step 401 A computing control module obtains a registration request of a first user, and registers information about the first user based on the registration request, to obtain an identifier of the first user.
  • the registration request of the first user is obtained by using the computing control module in a service host.
  • a user interaction interface of the computing control module obtains the information about the first user, and generates the identifier of the first user based on the information about the first user.
  • Step 402 A container engine obtains the identifier of the first user from the computing control module.
  • Step 403 The container engine registers and creates a container image information database of the first user based on the identifier of the first user, where the container image information database includes one or more identifiers of one or more container images associated with the identifier of the first user.
  • Step 404 The container engine stores the container image information database of the first user in local storage space of the service host on which the container engine is located.
  • step 401 to step 404 are a process of creating the container image information database.
  • the container image information database does not need to be re-created each time. Therefore, step 401 to step 404 are optional steps in a container provisioning process.
  • Step 405 The container engine obtains a container provisioning request, where the container provisioning request carries the identifier of the first user and an identifier of a first container image.
  • the identifier of the first container image is used to indicate the first container image required by a first container to be provisioned as requested by the container provisioning request.
  • the identifier of the first container image may be an ID of the first container image and/or a name of the first container image.
  • the identifier of the first user is used for an operation such as an authentication operation or an operation of obtaining the container image repository of the first user in the container provisioning process.
  • the identifier of the first user may include an ID of the first user and/or a token of the first user.
  • step 405 includes:
  • the user interaction interface may alternatively be implemented by another component deployed on the service host or a management host.
  • the container provisioning request is obtained through the user interaction interface, and is output to the container engine, so that the container engine obtains the container provisioning request.
  • Step 406 The container engine obtains, from the local storage space, the container image information database corresponding to the identifier of the first user.
  • the container image information database of the first user one-to-one corresponds to the ID of the first user
  • the container image information database corresponding to the identifier of the first user is a container image information database corresponding to the ID of the first user.
  • the container engine may obtain the ID of the first user by using the computing control module deployed in the service host, and the ID of the first user is generated when the first user registers by using the computing control module.
  • the container image information database of the first user is stored, in a form of a data file, in the local storage space of the service host on which the container engine is located, and the container image information database includes the identifiers of the one or more container images associated with the ID of the first user.
  • step 406 includes: obtaining, by the container engine, an authentication result based on the identifier of the first user; and when the authentication result is successful, querying, by the container engine, the container image information database corresponding to the identifier of the first user.
  • the authentication operation may be an operation that the container engine authenticates the token of the first user based on user registration information in a container management system, or may be an operation that the container engine outputs the token of the first user to another authentication module for authentication through an interlace.
  • Step 407 The container engine queries the identifier of the first container image in the container image information data corresponding to the identifier of the first user.
  • step 407 includes:
  • the identifier of the first container image may be used to obtain information about the first container image.
  • the information about the first container image may include one or more identifiers of one or more read-only layers included in the first container image, and storage index information of the one or more read-only layers, where the storage index information is used to obtain the read-only layer from the local storage space.
  • the information about the first container image may be included in the container image information database of the first user, or may be stored in another information storage space or may be included in another information set.
  • step 408 is performed.
  • the container engine may further obtain the first container image from the container image repository.
  • the method further includes:
  • the container engine when the identifier of the first container image does not exist in the container image information database and an attribute of the first container image is public, obtaining, by the container engine, the first container image from a public container image repository.
  • the private container image repository of the first user and the public container image repository may be deployed on the service host or another host, and the container engine may obtain the first container image from the private container image repository of the first user or the public container image repository through a local interface or a remote interface.
  • the attribute of the first container image is found from the management host by the container engine based on the identifier of the first container image.
  • Step 408 When the identifier of the first container image exists in the container image information database of the first user, the container engine obtains, based on the identifier of the first container image, the first container image from the local storage space of the host on which the container engine is located, and provisions a first container based on the first container image.
  • step 408 when the identifier of the first container image exists in the container image information database of the first user, step 408 includes:
  • the container engine obtains, from the local storage space based on the information about the first container image, the one or more read-only layers included in the first container image.
  • the container engine integrates, by using a UM technology, the one or more read-only layers and a read/write layer required by a to-be-provisioned first container into the first container, and provisions the first container.
  • a container image information database corresponding to an identifier of a user is queried. After an identifier of a container image is found from the container image information database of the user, the container image is obtained based on the identifier of the container image, and a container is further provisioned based on the container image.
  • a container provisioning process only the container image information database of the user is queried, but a container image information database of another user is not queried. In this case, a container image of another user is not obtained. This implements user-level isolation of user data in the container provisioning process, and ensures security of the user data.
  • the container management method may be further used to manage a container image submission process.
  • FIG. 5 shows a flowchart of a container management method according to an embodiment of the present application. The method is used to manage a container image submission process and includes the following steps.
  • Step 501 A container engine obtains a container image submission request, where the container image submission request is used to request to convert a second container into a second container image and submit the second container image.
  • the second container is a container instance of a first user in a service host, and the container image submission request carries an identifier of the first user and an identifier of the second container.
  • the identifier of the second container may be an ID of the second container and/or a name of the second container.
  • the identifier of the first user is used for an operation such as an authentication operation or an operation of obtaining a container image repository of the first user in a container image submission process.
  • the identifier of the first user may include an ID of the first user and/or a token of the first user.
  • the container image submission request may be a container image submission request obtained by the container engine through a user interaction interface and sent by a user.
  • the user interaction interface may alternatively be implemented by another component deployed on the service host or a management host. The component obtains the container image submission request through the user interaction interface, and outputs the container image submission request to the container engine, so that the container engine obtains the container image submission request.
  • Step 502 The container engine obtains the second container, where the second container is stored in local storage space of the host on which the container engine is located.
  • Step 503 The container engine generates the second container image based on the second container.
  • step 503 includes:
  • the container image submission request further includes the token of the first user.
  • step 503 includes
  • step 406 For the authentication operation, refer to the related descriptions in step 406 , and details are not described herein.
  • Step 504 The container engine adds an identifier of the second container image to a container image information database of the first user.
  • step 504 includes:
  • the container image information database of the first user in the service host, and obtaining, by the container engine from the service host, the container image information database of the first user based on the ID of the first user; and storing, by the container engine, the second container image in the local storage space of the service host, adding the identifier of the second container image to the container image information database of the first user, and associating information about the second container image with the identifier of the first user.
  • step 504 includes:
  • step 406 obtaining, by the container engine, the authentication result based on the identifier of the first user.
  • the authentication operation refer to the related descriptions in step 406 , and details are not described herein.
  • the identifier of the second container image is added to the container image information database of the first user, and this adding operation may be implemented by the container engine, or may be implemented by the another component deployed on the management host.
  • Performing authentication based on the identifier of the first user may be that the container engine performs authentication based on the token of the first user included in the identifier of the first user.
  • the method further includes step 505 in which the container engine uploads the second container image to a private container image repository of the first user.
  • the container engine stores the second container image into the private container image repository of the first user through a local interface or a remote interface.
  • the container engine stores the second container image into a private container image repository of a first user on a storage host through the local interface or the remote interface.
  • a container of a user is converted into a container image, and an identifier of the container image is added to a container image information database of the user.
  • the container image information database of the user includes the identifier of the container image of the user.
  • the container image of the user in the storage space of the service host can be obtained, but a container image of another user cannot be obtained. This implements user-level isolation of user data, and ensures security of the user data.
  • the cloud service management system may be OpenStack
  • the container management system may be a Docker container management system.
  • FIG. 6 shows a system architecture diagram of an OpenStack-based Docker container management system.
  • OpenStack includes at least Nova, Keystone (authentication module), and Glance (an image service component of OpenStack).
  • Nova includes Nova API (interface), Nova conductor, Nova scheduler (scheduler), and Nova compute (compute).
  • the Docker container management system includes at least Docker and Docker registry (repository).
  • Nova compute and Docker are deployed on a service host
  • Nova API, Nova conductor, Nova scheduler, Keystone, and Glance are deployed on a management host
  • Docker registry is deployed on the service host, the management host, or a storage host.
  • the service host, the management host, and the storage host may be a same physical host or virtual host, and deployment manners of the preceding components on the service host, the management host, and the storage host are not limited to the preceding examples.
  • Nova is used to dock a Docker-related interface to implement container management on the service host, and a function of Nova is similar to that of the cloud service management system.
  • Keystone is an authentication module and is used to dock the Docker-related interface to authenticate an identifier of a user.
  • Glance is used to dock the Docker-related interface to manage user information and information about a container image.
  • the information about the container image includes but is not limited to the following information: an identifier of the container image and an attribute of the container image.
  • Docker is used to implement user management and container management on the service host, and a function of Docker is similar to that of the preceding container engine.
  • Docker registry is used for storage and distribution of the container image, and includes a public registry and a private registry.
  • the public registry stores a public container image
  • the private registry stores a private container image of a user.
  • a function of Docker registry is similar to that of the preceding container image repository.
  • Docker may further include one or more of the following interfaces.
  • a Docker authentication interface is used to authenticate the identifier of the user.
  • An authentication result is used to determine whether the user has a permission to perform a current operation. If the authentication result is successful, the user has the permission to perform the current operation. If the authentication result is failed, the user does not have the permission to perform the current operation.
  • the Docker authentication interface may be used as a proxy for another authentication module, and provides an interface for the another authentication module to implement an authentication operation.
  • the Docker authentication interface may be used as a proxy for Keystone of OpenStack, output the identifier of the user to Keystone through a relevant interface, and obtain and output an authentication result of the identifier of the user provided by Keystone, to authenticate the identifier of the user.
  • the identifier of the user includes a token of the user.
  • the Docker authentication interface may be added to Docker in a form of a plug-in.
  • a Docker user management interface is used to implement functions such as registration, deregistration, and query of a user.
  • the user may further register and create a container image information database of the user in Docker through the Docker user management interface, or deregister and delete a container image information database of the user.
  • a function implementation of the Docker user management interface may include: outputting related information about a registration request, a deregistration request, or a query request of the user to Keystone through the Docker user management interface, and obtaining and outputting a result of the registration request, the deregistration request, or the query request performed by Keystone on the user.
  • the Docker user management interface may further output a registration result, a deregistration result, or a query result through a user interaction interlace.
  • a Docker pull interface is used to download a container image from the private registry or the public registry based on a user requirement, and a process is as follows: The identifier of the user is authenticated through the Docker authentication interlace. If authentication is pass and the container image information database does not include the information about the container image, the container image is downloaded from the private registry or the public registry to local storage space of the service host. In addition, the Docker pull interlace may further add the information about the container image to the container image information database of the user.
  • a Docker commit interface is used to convert a container of the user to a private container image of the user, and a process is as follows: The identifier of the user is authenticated through the Docker authentication interface. If the authentication result is successful and the container image information database of the user exists on the service host, the container is converted into a container image and information about the container image is added to the container image information database of the user. In addition, the Docker commit interface may further save the converted container image in the local storage space of the service host.
  • a Docker container instance creation interface is used to create a container based on a user requirement, and a process is as follows: The identifier of the user is authenticated through the Docker authentication interface. If the authentication result is successful, it is determined whether the container image information database of the user exists on the service host. If the container image information database of the user exists, the required information about the container image is queried in the container image information database of the user. If the container image information database of the user includes the information about the container image, the container image is obtained based on the information about the container image. If the container image information database of the user does not include the information about the container image, the Docker pull interlace is invoked to download the container image from the private registry or the public registry to the service host. The container is created based on the container image.
  • the information about the downloaded container image is added to the container image information database of the user, the information about the container image is obtained by using the container image information database of the user, the container image is obtained based on the information about the container image, and the container is created based on the container image.
  • a Docker push interface is used to upload a local container image to the private registry or the public registry, and a process is as follows: The identifier of the user is authenticated through the Docker authentication interface. If the authentication result is successful, the information about the container image is queried in the container image information database of the user. If the container image information database of the user includes the information about the container image, the container image is uploaded to the private registry or the public registry of the user.
  • a Docker container image information query interface is used to query, based on a user requirement, the information about the container image associated with the identifier of the user.
  • the Docker container image information query interface may query the information about the container image included in the container image information database of the user.
  • the Docker container image information query interface invokes Glance to query the information about the container image included in the private registry of the user.
  • the information about the container image is the identifier of the container image.
  • the Docker container image information query interface may further output the query result through the user interaction interlace.
  • FIG. 7A and FIG. 7B show a flowchart of a container management method according to the present application.
  • the method includes the following steps.
  • Step 701 Nova receives a container provisioning request through Nova API.
  • the container provisioning request is used to request to provision a third container.
  • the container provisioning request includes at least an identifier of a first user initiating the container provisioning request and an identifier of a third container image, and the third container image is a container image required for provisioning the third container.
  • the identifier of the first user may include an ID of the first user and/or a token of the first user
  • the identifier of the third container image is an ID of the third container image and/or a name of the third container image.
  • Step 702 Nova invokes Keystone to authenticate the token of the first user. If an authentication result is successful, step 703 is performed.
  • step 702 further includes: if the authentication result is failed, failing to provision the container.
  • Step 703 Nova invokes Nova scheduler to select a service host for provisioning the third container, and sends related information of the container provisioning request to Nova compute deployed on the service host.
  • Step 704 Nova compute invokes Glance to obtain an attribute of the third container image based on the identifier of the third container image.
  • step 704 may further include: invoking, by Nova compute, Glance to obtain the name of the third container image based on the ID of the third container image.
  • Step 705 Nova compute invokes Docker, and sends the related information about the container provisioning request to Docker.
  • the related information of the container provisioning request includes but is not limited to the container provisioning request, the identifier of the first user, and the identifier of the third container image.
  • Step 706 Docker invokes Keystone to authenticate the token of the first user. If the authentication result is successful, step 707 is performed. If the authentication result is failed, the container fails to be provisioned.
  • Step 707 Docker invokes a Docker user management interface to check whether a container image information database of the first user exists. If the container image information database of the first user exists, step 708 is performed. If the container image information database of the first user does not exist, the container fails to be provisioned.
  • step 707 further includes: if the container image information database of the first user does not exist, failing to provision the container; feeding back, through Nova API, information that the container image information database of the first user does not exist to the first user; and triggering, by the first user, based on a feedback result of Nova API, to establish the container image information database of the first user.
  • the container image information database of the first user For an operation of establishing the container image information database of the first user, refer to step 501 .
  • Step 708 Docker invokes a Docker container image information query interface to check whether information about the third container image exists in the container image information database of the first user. If the information about the third container image exists, step 709 is performed. If the information about the third container image does not exist, step 710 is performed.
  • Step 709 Docker obtains the information about the third container image and obtains the third container image based on the information about the third container image, and performs step 713 .
  • Step 710 Docker determines the attribute of the third container image. If the attribute of the third container image is public, step 711 is performed. If the attribute of the third container image is private, step 712 is performed.
  • Step 711 Docker invokes a Docker pull interface to download the third container image from a public registry, and performs step 713 .
  • Step 712 Docker invokes the Docker pull interface to download the third container image from a private registry of the first user, and performs step 713 .
  • Step 713 Docker creates and provisions the third container based on the third container image.
  • steps 706 to 713 are implemented by invoking a Docker container instance creation interface by Docker.
  • a container image information database corresponding to an identifier of a user is queried. After an identifier of a container image is found from the container image information database of the user, the container image is obtained based on the identifier of the container image, and a container is further provisioned based on the container image.
  • a container provisioning process the container image information database of the user is queried, but a container image information database of another user is not queried. In this case, a container image of the another user is not obtained. This implements user-level isolation of user data in the container provisioning process, and ensures security of the user data.
  • an instruction, information, and/or data are/is sent to each module in an OpenStack system through a Docker interface in Docker, and functions such as user registration and user authentication in the OpenStack system may be used, to ensure the security of the user data in the Docker container management system.
  • FIG. 8 shows a flowchart of a container management method according to the present application.
  • the method includes the following steps.
  • Step 801 Nova receives a container image submission request through Nova API.
  • the container image submission request is used to request to convert a fourth container into a fourth container image and submit the fourth container image.
  • a container image submission request includes:
  • an identifier of a first user initiating the container image submission request and an identifier of a Docker container instance where the identifier of the first user includes an ID of the first user and/or a token of the first user, and the identifier of the Docker container instance is an identifier of the Docker container instance in which the fourth container is located.
  • Step 802 Nova invokes Keystone to authenticate the token of the first user. If an authentication result is successful, step 803 is performed.
  • Step 803 Nova obtains, based on the identifier of the Docker container instance, an identifier of a service host on which the Docker container instance is located and an identifier of the fourth container.
  • Step 804 Nova sends related information about the container image submission request to Nova compute.
  • the related information about the container image submission request includes but is not limited to the container image submission request, the identifier of the first user, and the identifier of the fourth container.
  • Step 805 Nova compute invokes Docker, and sends the related information of the container image submission request to Docker.
  • Step 806 Docker invokes Keystone to authenticate the token of the first user. If the authentication result is successful, step 807 is performed. If the authentication result is failed, container image submission fails.
  • Step 807 Docker invokes a Docker user management interface to check whether a container image information database of the first user exists. If the container image information database of the first user exists, step 808 is performed. If the container image information database of the first user does not exist, container image submission fails.
  • Step 808 Docker invokes a Docker commit interface to convert the fourth container into the fourth container image, and adds information about the fourth container image to the container image information database of the first user.
  • Step 809 Nova compute invokes Glance to create a Glance image.
  • the Glance image is an image of the fourth container image in Glance, so that Nova can use the Glance image for container provisioning on another service host.
  • step 809 further includes: establishing a mapping relationship between an identifier of the Glance image and a name of the fourth container image.
  • Step 810 Docker invokes a Docker push interlace to upload the fourth container image to a private registry of the first user.
  • step 810 includes: invoking the Docker push interface by Docker; invoking the Docker user management interface by the Docker push interface, to output the token of the first user to Keystone for authentication; and if the authentication result is successful, uploading the fourth container image to the private registry of the first user.
  • a container of a user is converted into a container image, and an identifier of the container image is added to a container image information database of the user.
  • the container image information database of the user includes the identifier of the container image of the user.
  • the container image of the user in storage space of the service host can be obtained, but a container image of another user cannot be obtained. This implements user-level isolation of user data is implemented, and ensures security of the user data.
  • an instruction, information, and/or data are/is sent to each module in an OpenStack system through a Docker interface in Docker, and functions such as user registration and user authentication in the OpenStack system may be used, to ensure the security of the user data in the Docker container management system.
  • FIG. 9 shows a block diagram of a container management apparatus 900 according to the present application.
  • the container management apparatus 900 includes an obtaining module 910 , a query module 920 , and a provisioning module 930 .
  • the obtaining module 910 is configured to obtain a container provisioning request.
  • the container provisioning request carries an identifier of a first user and an identifier of a first container image.
  • the query module 920 is configured to query a container image information database corresponding to the identifier of the first user, where the container image information database is used to store a mapping relationship between the identifier of the first user and the first container image.
  • the provisioning module 930 is configured to: when the identifier of the first container image exists in the container image information database, obtain the first container image based on the identifier of the first container image, and provision a first container based on the first container image.
  • the provisioning module 930 is configured to: obtain information about the first container image based on the identifier of the first container image; and obtain the first container image from local storage space based on the information about the first container image, and start the first container based on the first container image.
  • the query module 920 is configured to: obtain an authentication result based on the identifier of the first user; and when the authentication result is successful, query the container image information database corresponding to the identifier of the first user.
  • the provisioning module 930 is further configured to: when the identifier of the first container image does not exist in the container image information database and an attribute of the first container image is private, obtain the first container image from a private container image repository of the first user; or when the identifier of the first container image does not exist in the container image information database and an attribute of the first container image is public, obtain the first container image from a public container image repository.
  • the container management apparatus 900 further includes:
  • a creation module configured to register and create, based on the identifier of the first user, the container image information database corresponding to the identifier of the first user, where the container image information database includes one or more identifiers of one or more container images associated with the identifier of the first user.
  • the container management apparatus 900 further includes:
  • a generation module 940 configured to generate a second container image based on the first container, where the second container image includes at least one of information about the first user, an application, and a driver;
  • an adding module 950 configured to add an identifier of the second container image to the container image information database of the first user
  • an uploading module 960 configured to upload the second container image to the private container image repository of the first user.
  • the container management apparatus 900 in the embodiments of the present application may be implemented by using an application-specific integrated circuit (ASIC), or a programmable logic device (PLD).
  • the PLD may be a complex programmable logic device (CPLD), a field-programmable gate array (FPGA), a generic array logic (GAL), or any combination thereof.
  • CPLD complex programmable logic device
  • FPGA field-programmable gate array
  • GAL generic array logic
  • the apparatus and the modules of the apparatus may also be software modules.
  • the container management apparatus 900 may correspondingly perform the method described in the embodiments of the present application, and the foregoing and other operations and/or functions of the units in the container management apparatus 900 are separately used to implement corresponding procedures performed by the container engine in the method in FIG. 4 or FIG. 5 .
  • details are not described herein.
  • a container image information database corresponding to an identifier of a user is queried. After an identifier of a container image is found from the container image information database of the user, the container image is obtained based on the identifier of the container image, and a container is further provisioned based on the container image.
  • a container provisioning process the container image information database of the user is queried, but a container image information database of another user is not queried. In this case, a container image of the another user is not obtained. This implements user-level isolation of user data in the container provisioning process, and ensures security of the user data.
  • the container of the user is converted into the container image, and the identifier of the container image is added to the container image information database of the user.
  • the container image information database of the user includes the identifier of the container image of the user. This implements the user-level isolation of the user data and ensures the security of the user data.
  • FIG. 11 is a schematic structural diagram of a container management device according to an embodiment of the present application.
  • the device may be a server or a terminal.
  • the container management device 1100 includes a processor 1101 , a memory 1102 , a communications interface 1103 , a bus 1104 , and a graphics processing unit 1105 .
  • the processor 1101 , the memory 1102 , the communications interface 1103 , and the graphics processing unit 1105 communicate with each other by using the bus 1104 , or may communicate with each other in another manner such as wireless transmission.
  • the memory 1102 is configured to store an instruction
  • the processor 1101 is configured to execute the instruction stored in the memory 1102 .
  • the memory 1102 stores program code, and the processor 1101 may invoke the program code stored in the memory 1102 to perform the following operations:
  • the container provisioning request carries an identifier of a first user and an identifier of a first container image
  • the container image information database is used to store a mapping relationship between the identifier of the first user and the first container image
  • the container image information database when the identifier of the first container image exists in the container image information database, obtaining the first container image based on the identifier of the first container image, and provisioning a first container based on the first container image.
  • the processor 1101 may be a CPU, or the processor 1101 may be another general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field-programmable gate array (FPGA), or another programmable logic device, discrete gate or transistor logic device, discrete hardware component, or the like.
  • the general-purpose processor may be a microprocessor, any conventional processor, or the like. It should be noted that the processor 1101 may be a processor supporting an ARM architecture.
  • the memory 1102 may include a read-only memory and a random access memory, and provide an instruction and data for the processor 1101 .
  • the memory 1102 may further include a nonvolatile random access memory.
  • the memory 1102 may further store information of a device type.
  • the memory 1102 may be a volatile memory or a nonvolatile memory, or may include a volatile memory and a nonvolatile memory.
  • the nonvolatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory.
  • the volatile memory may be a random access memory (RAM), used as an external cache.
  • RAMs may be used, for example, a static random access memory (SRAM), a dynamic random access memory (DRAM), a synchronous dynamic random access memory (SDRAM), a double data rate synchronous dynamic random access memory (DDR SDRAM), an enhanced synchronous dynamic random access memory (ESDRAM), a synchronous link dynamic random access memory (SLDRAM), and a direct rambus random access memory (DR RAM).
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • SDRAM synchronous dynamic random access memory
  • DDR SDRAM double data rate synchronous dynamic random access memory
  • ESDRAM enhanced synchronous dynamic random access memory
  • SLDRAM synchronous link dynamic random access memory
  • DR RAM direct rambus random access memory
  • the bus 1104 may include a power bus, a control bus, a status signal bus, and the like, in addition to a data bus. However, for clear description, various types of buses in the figure are marked as the bus 1104 .
  • the container management device 1100 may correspond to the container management apparatus 900 shown in FIG. 9 or FIG. 10 in the embodiment of the present application, and may correspond to operation steps in which the container engine for performing the method shown in FIG. 4 or FIG. 5 in the embodiment of the present application is an execution body.
  • the foregoing and other operations and/or functions of the modules in the container engine are separately used to implement corresponding procedures of the method in FIG. 4 or FIG. 5 .
  • details are not described herein.
  • An embodiment of the present application further provides a non-transitory computer-readable storage medium.
  • the computing system When an instruction in the storage medium is executed by a processor of a computing system, the computing system is enabled to perform the container management method provided in any one of FIG. 4 , FIG. 5 , FIG. 7A and FIG. 7B , or FIG. 8 .
  • a computer program product including an instruction is provided.
  • the computer program product runs on a computer, the computer is enabled to execute the instruction for performing the container management method provided in any one of FIG. 4 , FIG. 5 , FIG. 7A and FIG. 7B , or FIG. 8 .
  • All or some of the foregoing embodiments may be implemented by using software, hardware, firmware, or any combination thereof.
  • the software is used for implementation, all or some of the embodiments may be implemented in a form of a computer program product.
  • the computer program product includes one or more computer instructions.
  • the computer instructions When the computer instructions are loaded and executed on an apparatus, the procedures or functions according to the embodiments of the present application are all or partially generated.
  • the computer instructions may be stored in a computer-readable storage medium or may be transmitted from a computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from a website, computer, server, or data center to another website, computer, server, or data center in a wired (for example, a coaxial optical cable, an optical fiber, or a digital subscriber line) or wireless (for example, infrared, radio, or microwave) manner.
  • the computer-readable storage medium may be any usable medium accessible by an apparatus, or a data storage device, such as a server or a data center, integrating one or more usable media.
  • the usable medium may be magnetic media (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a digital video disk (DVD)), semiconductor medium (for example, a solid-state drive), or the like.

Abstract

This application discloses a container management method, apparatus, and device. The method includes: obtaining a provisioning request that carries an identifier of a first user and an identifier of a first container image; querying and obtaining the identifier of the first container image in a container image information database of the first user; obtaining the container image based on the identifier of the first container image; and provisioning a container based on the container image.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of International Application No. PCT/CN2019/085509, filed on May 5, 2019, which claims priority to Chinese Patent Application No. 201810713108.3, filed on Jun. 29, 2018. The disclosures of the aforementioned applications are hereby incorporated by reference in their entireties.
  • TECHNICAL FIELD
  • This application relates to the field of computer technologies, and in particular, to a container management method, apparatus, and device.
  • BACKGROUND
  • A container technology is a lightweight virtualization technology used to share server resources. A container may provide a virtual execution environment for a process, and one virtual execution environment is one container. A container image is a read-only special file system that provides a program, a library, a resource, and a configuration required for running a container, and does not include any dynamic data. A container management system may distribute and run a container based on a container image, or convert a container into a container image and save the container image.
  • In the conventional technology, the container management system is loaded on a host. The container management system may provision a container for a user, and provide, on the host, storage space for storing a container image for the user. The user may customize the container image and store the container image in the storage space, and another user may download the container image and start the container.
  • However, when the container management system provisions the container, the user may not only obtain the container image stored by the user, but also obtain a container image stored by another user. This may result in leakage of user data and cause the security problem.
  • SUMMARY
  • This application provides a container management method, apparatus, and device, to overcome the security problem in the conventional technology.
  • According to a first aspect, this application provides a container management method, including: obtaining a container provisioning request, wherein the container provisioning request is a request used to provision a first container based on a first container image, and the container provisioning request carries an identifier of the first container image and an identifier of a first user; and querying a container image information database corresponding to the identifier of the first user. The container image information database is used to store a mapping relationship between the identifier of the first user and the first container image. Therefore, when the identifier of the first container image exists in the container image information database, the first container image is obtained based on the identifier of the first container image. In this way, the first container is provisioned based on the first container image. In a container provisioning process, the container image information database of the first user is queried, but a container image information database of another user is not queried. In this case, a container image of another user is not obtained. This implements user-level isolation of user data in the container provisioning process, and ensures security of the user data.
  • In a possible implementation, the container image information database is registered and created, and the identifier of the first user is further obtained during registration. The container image information database is used to store one or more identifiers of one or more container images associated with the identifier of the first user. If the first container image is one of the one or more container images associated with the identifier of the first user, the container image information database includes the identifier of the first container image. Registering and creating the container image information database can ensure a correspondence between the container image information database and the identifier of the first user, and further ensure the security of the user data of the first user because the container image information database of the first user cannot be obtained based on an identifier of the another user.
  • In another possible implementation, information about the first container image is obtained based on the identifier of the first container image. The information about the first container image may be included in the container image information database, or may be included in another information set. In addition, the information about the first container image can be obtained based on the identifier of the first container image. In this way, the first container image can be obtained based on the information about the first container image. In addition, the first container image may be stored in local storage space. This obtaining manner ensures the security of the user data.
  • In another possible implementation, when the identifier of the first container image that is carried in the container provisioning request is not included in the container image information database, the first container image may be further obtained from a container image repository based on an attribute of the first container image. When the attribute of the first container image is private, the container image repository is a private container image repository of the first user; or when the attribute of the first container image is public, the container image repository is a public container image repository. Storage locations of the private container image repository of the first user and the public container image repository may not be in the local storage space, for example, may be stored in a cloud. This facilitates centralized management of container images. In addition, the container images are separately stored based on attributes (public or private) of the container images to facilitate subsequent search and isolation. This further ensures the security of the user data.
  • In another possible implementation, the method may further include: generating a second container image based on the first container, where the second container image may be the same as or different from the first container image, and the second container image includes information about the first user, an application, and/or a driver; adding an identifier of the second container image to the container image information database, to be specific, associating the identifier of the second container image with the identifier of the first user in the container image information database; and uploading the second container image to the private container image repository of the first user, and to provision a container. This isolates different user data and ensures the security of the user data.
  • In another possible implementation, before the container image information database corresponding to the identifier of the first user is queried, an authentication result may be further obtained based on the identifier of the first user. When the authentication result is successful, an operation of querying the container image information database is performed. An authentication operation may further improve the security of the user data in the container management method by using a strict authentication algorithm.
  • According to a second aspect, this application provides a container management apparatus. The apparatus includes modules configured to perform the container management apparatus in any one of the first aspect or the possible implementations of the first aspect.
  • According to a third aspect, a container management device is provided. The apparatus includes a processor and a memory, the memory stores at least one instruction, and the processor loads and executes the instruction to implement any container management method described above.
  • According to a fourth aspect, a computer-readable storage medium is provided. The storage medium stores at least one instruction, and a processor loads and executes the instruction to implement any container management method described above.
  • According to a fifth aspect, a computer program product including an instruction is provided. When the computer program product runs on a computer, the computer is enabled to perform any container management method described above.
  • The technical solutions provided in this application include at least the following beneficial effects.
  • In this application, a container image information database corresponding to an identifier of a user is queried. After an identifier of a container image is found from the container image information database of the user, the container image is obtained based on the identifier of the container image, and a container is further provisioned based on the container image. In a container provisioning process, the container image information database of the user is queried, but a container image information database of another user is not queried. In this case, a container image of another user is not obtained. This implements user-level isolation of user data in the container provisioning process, and ensures security of the user data.
  • It should be understood that the foregoing general descriptions and the following detailed descriptions are only examples and explanatory, and do not limit this application.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a schematic diagram of a storage form of a container image in a conventional technology;
  • FIG. 2 is an architectural diagram of a system in a container management method according to an embodiment of the present application;
  • FIG. 3 is a schematic diagram of a container image information database in a container management method according to an embodiment of the present application;
  • FIG. 4 is a flowchart of a container management method according to an embodiment of the present application;
  • FIG. 5 is a flowchart of a container management method according to an embodiment of the present application;
  • FIG. 6 is an architectural diagram of a system in a container management method according to an embodiment of the present application;
  • FIG. 7A and FIG. 7B are a flowchart of a container management method according to an embodiment of the present application;
  • FIG. 8 is a flowchart of a container management method according to an embodiment of the present application;
  • FIG. 9 is a structural block diagram of a container management apparatus according to an embodiment of the present application;
  • FIG. 10 is a structural block diagram of a container management apparatus according to an embodiment of the present application; and
  • FIG. 11 is a structural block diagram of a container management device according to an embodiment of the present application.
  • DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS
  • To make objectives, technical solutions, and advantages of this application clearer, the following further describes implementations of the present application in detail with reference to accompanying drawings.
  • An application scenario of embodiments of the present application is first described before the embodiments of the present application are described in detail.
  • A container technology is a lightweight virtualization technology used to share server resources. The container technology may provide a virtual execution environment for a process, and one container provides one virtual execution environment. The virtual execution environment may be bound to a specific central processing unit (CPU) and a memory node, allocate a specific proportion of CPU time and a specific proportion of input/output (IO) time, limit available memory size, and provide device access control. Compared with a virtual machine, the container is more lightweight, easier to distribute, and has higher performance and lower losses.
  • A container image is a read-only special file system that provides a program, a library, a resource, and a configuration required for running a container, and does not include any dynamic data. The container image includes one or more of the following information: information about a user, an application, and a driver. The container image is a layered structure and includes a plurality of layers of read-only data. The plurality of layers include one or more of the following layers: a base image layer, an application program layer, a user-defined layer, and the like. A plurality of read-only layers may be integrated into one container image by using a union file system (UFS) technology.
  • The container is an instance created based on the container image. The instance is an object that includes a user configuration and a running configuration required for implementing a function of the container image. Provisioning the container based on the container image may be adding a read/write layer based on the read-only layers of the container image, and integrating the plurality of read-only layers and the read/write layer into one container by using a union mount (UM) technology. The container is classified into an application container and a system container based on different application scenarios. The application container is used to orchestrate and schedule a stateless application, and an application container image includes an application and a running environment configuration. The system container is used to orchestrate and schedule computing resources such as a CPU, a memory, and a storage resource. The system container has a full operating system (OS) environment, supports a stateful application, and can provide dynamic resource allocation.
  • In the conventional technology, a computing service system that provides a computing service generally includes a management host configured to manage the provided computing service and a service host that provides a specific computing service. In addition, the computing service system may further include a storage host, and the storage host is configured to store related data of the provided computing service. A container management system is installed on one service host, to provision a container running on the service host for a user, and provide local storage space for storing a container image for the user on the service host. The local storage space of the service host may store a plurality of container images of one or more users. Attributes of the container image may be public and private. A container image whose attribute is public is referred to as a public container image, and means that the container image is a container image open to all users. A container image whose attribute is private is referred to as a private container image, and means that the container image is a private container image of a user. The user may specify whether the private container image is open to all users. As shown in FIG. 1, a container image A and a container image B of a first user, and the container image B and a container image C of a second user are stored on a service host. The container image B is a public container image, the container image A is a private container image of the first user, and the container image C is a private container image of the second user. Storage of the container image A, the container image B, and the container image C on the service host is not isolated at a user level. When the first user provisions a container by using a container management system, the container images of the first user and the container images of the second user, namely, the container image A, the container image B, and the container image C, may be obtained from local storage space of the service host. The container may be provisioned based on the container image A, the container image B, or the container image C. When the second user provisions a container by using the container management system, a case is similar to that of the first user, and details are not described herein. It can be learned that the conventional container management system cannot implement isolation of container images of different users on the service host. This is not conducive to protecting security of user data.
  • To protect the security of the user data, the present application provides a container management solution, to implement user-level isolation of user data in a container provisioning process. The container management solution may provide a container management solution for a user based on an infrastructure as a service (IaaS), and the IaaS may provide a computing service, for example, a cloud computing service, based on a complete computer infrastructure.
  • FIG. 2 shows a system architecture of a cloud service management system according to an embodiment of the present application. The system architecture includes a service host, a management host, and a storage host. The service host is configured to provide a specific cloud computing service, the management host is configured to manage the provided cloud computing service, and the storage host is configured to store related data of the provided cloud computing service.
  • It should be noted that the service host, the management host, and the storage host may be a same physical host or virtual host, or may be different physical hosts or virtual hosts. The physical host or the virtual host may be a host in an IaaS computing resource pool.
  • Further, a container management system runs in the cloud service management system, and the container management system includes at least a container engine and a container image repository. The system architecture shown in FIG. 2 is used as an example. At least a computing control module of the cloud service management system, and the container engine and the container image repository of the container management system are deployed on the service host. At least an authentication module of the cloud service management system is deployed on the management host. At least the container image repository of the container management system is deployed on the storage host. The container image repository includes a public container image repository and a private container image repository. Optionally, in addition to the system shown in FIG. 2, the cloud service management system in this embodiment of the present application may include another service host on which the computing control module and the container engine are deployed. A deployment manner of modules of the container management system on the service host, the management host, and the storage host is not limited to the foregoing examples.
  • The computing control module is configured to deploy cloud computing, including instance running, network management, user control, and the like. The authentication module is a module used to manage identity authentication, a service rule, and a token function. The container engine is used for container-related management, container-related user management, and the like. The container image repository is used to store and distribute a container image, and includes the public container image repository and the private container image repository.
  • In addition to the container image repository deployed on the storage host and used to store a container image, local storage space of the service host stores one or more container images of a user, and the user is a user that registers with the container engine on the service host. The one or more container images may be downloaded from the public container image repository in the container image repository or a private container image repository of the user, or may be obtained by converting a container on the service host.
  • The container image information database includes an identifier of a container image associated with an identifier of the user in the local storage space of the service host. Information about the container image may be further obtained based on the identifier of the container image, and the information about the container image includes one or more of the following information: an attribute of the container image and storage location information of the container image, for example, storage index information. It should be noted that, the information about the container image may be included in the container image information database of the user, or may be stored in other information storage space or included in another information set. However, regardless of where the information is stored, the information may be found according to a mapping relationship between the identifier of the container image and the information about the container image. The identifier of the user may be an identification (ID) of the user and/or a token (token) of the user. The identifier of the container image may be an ID of the container image and/or a name of the container image. It should be noted that the user has a permission to query the container image information database of the user, but does not have a permission to query a container image information database of another user.
  • FIG. 3 shows an example of a container image information database of a user. A container image information database of a first user includes an identifier of a container image A and an identifier of a container image B. A container image information database of a second user includes the identifier of the container image B and an identifier of a container image C. The container image B is a public container image, the container image A is a private container image of the first user, and the container image C is a private container image of the second user. The container image A includes a layer A1, a layer A2, and a layer B; the container image B includes the layer B; and the container image C includes the layer B and a layer C. For example, the layer A1 is a user-defined layer of the first user, the layer A2 is an application program layer of the first user, the layer B is a public base image layer, and the layer C is a user-defined layer of the second user. The container image information databases further include storage index information of the layer A1, the layer A2, and the layer B of the container image A, storage index information of the layer B of the container image B, and the storage index information of the layer B and storage index information of the layer C of the container image C.
  • In addition, the container image information database of the first user in a service host includes an identifier of a container image associated with an identifier of the first user, and the container image information database of the second user includes an identifier of a container image associated with an identifier of the second user. A user cannot query a container image information database of another user. To be specific, a user cannot obtain an identifier of a container image in a container image information database of another user. In this way, user-level isolation of user data can be implemented.
  • The following describes a method embodiment of the present application by using an example of the system architecture shown in FIG. 2. FIG. 4 shows a flowchart of a container management method according to an embodiment of the present application. The method is used to manage a container provisioning process and includes the following steps.
  • Step 401: A computing control module obtains a registration request of a first user, and registers information about the first user based on the registration request, to obtain an identifier of the first user.
  • The registration request of the first user is obtained by using the computing control module in a service host. For example, a user interaction interface of the computing control module obtains the information about the first user, and generates the identifier of the first user based on the information about the first user.
  • Step 402: A container engine obtains the identifier of the first user from the computing control module.
  • Step 403: The container engine registers and creates a container image information database of the first user based on the identifier of the first user, where the container image information database includes one or more identifiers of one or more container images associated with the identifier of the first user.
  • For the container image information database of the first user, refer to the related descriptions in FIG. 2, and details are not described herein.
  • Step 404: The container engine stores the container image information database of the first user in local storage space of the service host on which the container engine is located.
  • It should be noted that step 401 to step 404 are a process of creating the container image information database. For container provisioning, the container image information database does not need to be re-created each time. Therefore, step 401 to step 404 are optional steps in a container provisioning process.
  • Step 405: The container engine obtains a container provisioning request, where the container provisioning request carries the identifier of the first user and an identifier of a first container image.
  • The identifier of the first container image is used to indicate the first container image required by a first container to be provisioned as requested by the container provisioning request. Optionally, the identifier of the first container image may be an ID of the first container image and/or a name of the first container image. The identifier of the first user is used for an operation such as an authentication operation or an operation of obtaining the container image repository of the first user in the container provisioning process. Optionally, the identifier of the first user may include an ID of the first user and/or a token of the first user.
  • In a possible implementation, step 405 includes:
  • obtaining, by the container engine, the container provisioning request of the user through the user interaction interface.
  • Optionally, the user interaction interface may alternatively be implemented by another component deployed on the service host or a management host. The container provisioning request is obtained through the user interaction interface, and is output to the container engine, so that the container engine obtains the container provisioning request.
  • Step 406: The container engine obtains, from the local storage space, the container image information database corresponding to the identifier of the first user.
  • Optionally, the container image information database of the first user one-to-one corresponds to the ID of the first user, and the container image information database corresponding to the identifier of the first user is a container image information database corresponding to the ID of the first user. The container engine may obtain the ID of the first user by using the computing control module deployed in the service host, and the ID of the first user is generated when the first user registers by using the computing control module.
  • In a possible implementation, the container image information database of the first user is stored, in a form of a data file, in the local storage space of the service host on which the container engine is located, and the container image information database includes the identifiers of the one or more container images associated with the ID of the first user.
  • To determine that the first user has a permission to perform a current operation, in an optional implementation, step 406 includes: obtaining, by the container engine, an authentication result based on the identifier of the first user; and when the authentication result is successful, querying, by the container engine, the container image information database corresponding to the identifier of the first user. The authentication operation may be an operation that the container engine authenticates the token of the first user based on user registration information in a container management system, or may be an operation that the container engine outputs the token of the first user to another authentication module for authentication through an interlace.
  • Step 407: The container engine queries the identifier of the first container image in the container image information data corresponding to the identifier of the first user.
  • In a possible implementation, step 407 includes:
  • querying, by the container engine based on the ID of the first user, the identifier of the first container image in the container image information database corresponding to the identifier of the first user. The identifier of the first container image may be used to obtain information about the first container image. The information about the first container image may include one or more identifiers of one or more read-only layers included in the first container image, and storage index information of the one or more read-only layers, where the storage index information is used to obtain the read-only layer from the local storage space. The information about the first container image may be included in the container image information database of the first user, or may be stored in another information storage space or may be included in another information set.
  • When the identifier of the first container image exists in the container image information database, step 408 is performed. When the identifier of the first container image does not exist in the container image information database, the container engine may further obtain the first container image from the container image repository. In an optional implementation, the method further includes:
  • when the identifier of the first container image does not exist in the container image information database and an attribute of the first container image is private, obtaining, by the container engine, the first container image from a private container image repository of the first user; or
  • when the identifier of the first container image does not exist in the container image information database and an attribute of the first container image is public, obtaining, by the container engine, the first container image from a public container image repository.
  • The private container image repository of the first user and the public container image repository may be deployed on the service host or another host, and the container engine may obtain the first container image from the private container image repository of the first user or the public container image repository through a local interface or a remote interface.
  • For the attribute of the first container image, refer to the related descriptions in FIG. 2, and details are not described herein.
  • Optionally, the attribute of the first container image is found from the management host by the container engine based on the identifier of the first container image.
  • Step 408: When the identifier of the first container image exists in the container image information database of the first user, the container engine obtains, based on the identifier of the first container image, the first container image from the local storage space of the host on which the container engine is located, and provisions a first container based on the first container image.
  • In a possible implementation, when the identifier of the first container image exists in the container image information database of the first user, step 408 includes:
  • obtaining, by the container engine, the information about the first container image based on the identifier of the first container image; and obtaining, by the container engine, the first container image from the local storage space based on the information about the first container image, and starting, by the container engine, the first container based on the first container image. For example, the container engine obtains, from the local storage space based on the information about the first container image, the one or more read-only layers included in the first container image. The container engine integrates, by using a UM technology, the one or more read-only layers and a read/write layer required by a to-be-provisioned first container into the first container, and provisions the first container.
  • According to the method provided in the present application, a container image information database corresponding to an identifier of a user is queried. After an identifier of a container image is found from the container image information database of the user, the container image is obtained based on the identifier of the container image, and a container is further provisioned based on the container image. In a container provisioning process, only the container image information database of the user is queried, but a container image information database of another user is not queried. In this case, a container image of another user is not obtained. This implements user-level isolation of user data in the container provisioning process, and ensures security of the user data.
  • Based on the foregoing embodiment, in an optional implementation, the container management method may be further used to manage a container image submission process. FIG. 5 shows a flowchart of a container management method according to an embodiment of the present application. The method is used to manage a container image submission process and includes the following steps.
  • Step 501: A container engine obtains a container image submission request, where the container image submission request is used to request to convert a second container into a second container image and submit the second container image.
  • The second container is a container instance of a first user in a service host, and the container image submission request carries an identifier of the first user and an identifier of the second container. Optionally, the identifier of the second container may be an ID of the second container and/or a name of the second container. The identifier of the first user is used for an operation such as an authentication operation or an operation of obtaining a container image repository of the first user in a container image submission process. Optionally, the identifier of the first user may include an ID of the first user and/or a token of the first user.
  • The container image submission request may be a container image submission request obtained by the container engine through a user interaction interface and sent by a user. Optionally, the user interaction interface may alternatively be implemented by another component deployed on the service host or a management host. The component obtains the container image submission request through the user interaction interface, and outputs the container image submission request to the container engine, so that the container engine obtains the container image submission request.
  • Step 502: The container engine obtains the second container, where the second container is stored in local storage space of the host on which the container engine is located.
  • Step 503: The container engine generates the second container image based on the second container.
  • In a possible implementation, step 503 includes:
  • separately reading, by the container engine, read-only layers included in the second container and loading the read-only layers layer by layer to obtain the second container image.
  • To determine that the first user has a permission to perform a current operation, the container image submission request further includes the token of the first user. In an optional implementation, step 503 includes
  • obtaining, by the container engine, an authentication result based on the token of the first user; and
  • if the authentication result is successful, generating, by the container engine, the second container image based on the second container.
  • For the authentication operation, refer to the related descriptions in step 406, and details are not described herein.
  • Step 504: The container engine adds an identifier of the second container image to a container image information database of the first user.
  • In an optical implementation, step 504 includes:
  • storing the container image information database of the first user in the service host, and obtaining, by the container engine from the service host, the container image information database of the first user based on the ID of the first user; and storing, by the container engine, the second container image in the local storage space of the service host, adding the identifier of the second container image to the container image information database of the first user, and associating information about the second container image with the identifier of the first user.
  • To determine that the first user has a permission to perform a current operation, in an optical implementation, step 504 includes:
  • obtaining, by the container engine, the authentication result based on the identifier of the first user. For the authentication operation, refer to the related descriptions in step 406, and details are not described herein.
  • If the authentication result is successful, the identifier of the second container image is added to the container image information database of the first user, and this adding operation may be implemented by the container engine, or may be implemented by the another component deployed on the management host.
  • Performing authentication based on the identifier of the first user may be that the container engine performs authentication based on the token of the first user included in the identifier of the first user.
  • Optionally, the method further includes step 505 in which the container engine uploads the second container image to a private container image repository of the first user. For example, the container engine stores the second container image into the private container image repository of the first user through a local interface or a remote interface. For example, the container engine stores the second container image into a private container image repository of a first user on a storage host through the local interface or the remote interface.
  • In this embodiment of the present application, a container of a user is converted into a container image, and an identifier of the container image is added to a container image information database of the user. In this case, the container image information database of the user includes the identifier of the container image of the user. The container image of the user in the storage space of the service host can be obtained, but a container image of another user cannot be obtained. This implements user-level isolation of user data, and ensures security of the user data.
  • In a possible implementation, the cloud service management system may be OpenStack, and the container management system may be a Docker container management system. FIG. 6 shows a system architecture diagram of an OpenStack-based Docker container management system. As shown in FIG. 6, OpenStack includes at least Nova, Keystone (authentication module), and Glance (an image service component of OpenStack). Nova includes Nova API (interface), Nova conductor, Nova scheduler (scheduler), and Nova compute (compute). The Docker container management system includes at least Docker and Docker registry (repository). Nova compute and Docker are deployed on a service host, Nova API, Nova conductor, Nova scheduler, Keystone, and Glance are deployed on a management host, and Docker registry is deployed on the service host, the management host, or a storage host. It should be noted that the service host, the management host, and the storage host may be a same physical host or virtual host, and deployment manners of the preceding components on the service host, the management host, and the storage host are not limited to the preceding examples.
  • In the OpenStack-based Docker container management system shown in FIG. 6, functions of components are as follows:
  • Nova is used to dock a Docker-related interface to implement container management on the service host, and a function of Nova is similar to that of the cloud service management system.
  • Keystone is an authentication module and is used to dock the Docker-related interface to authenticate an identifier of a user.
  • Glance is used to dock the Docker-related interface to manage user information and information about a container image. The information about the container image includes but is not limited to the following information: an identifier of the container image and an attribute of the container image.
  • Docker is used to implement user management and container management on the service host, and a function of Docker is similar to that of the preceding container engine.
  • Docker registry is used for storage and distribution of the container image, and includes a public registry and a private registry. The public registry stores a public container image, and the private registry stores a private container image of a user. A function of Docker registry is similar to that of the preceding container image repository.
  • In addition, Docker may further include one or more of the following interfaces.
  • A Docker authentication interface is used to authenticate the identifier of the user. An authentication result is used to determine whether the user has a permission to perform a current operation. If the authentication result is successful, the user has the permission to perform the current operation. If the authentication result is failed, the user does not have the permission to perform the current operation. Optionally, the Docker authentication interface may be used as a proxy for another authentication module, and provides an interface for the another authentication module to implement an authentication operation. For example, the Docker authentication interface may be used as a proxy for Keystone of OpenStack, output the identifier of the user to Keystone through a relevant interface, and obtain and output an authentication result of the identifier of the user provided by Keystone, to authenticate the identifier of the user. Optionally, the identifier of the user includes a token of the user. Optionally, the Docker authentication interface may be added to Docker in a form of a plug-in.
  • A Docker user management interface is used to implement functions such as registration, deregistration, and query of a user. The user may further register and create a container image information database of the user in Docker through the Docker user management interface, or deregister and delete a container image information database of the user. Optionally, a function implementation of the Docker user management interface may include: outputting related information about a registration request, a deregistration request, or a query request of the user to Keystone through the Docker user management interface, and obtaining and outputting a result of the registration request, the deregistration request, or the query request performed by Keystone on the user. Optionally, the Docker user management interface may further output a registration result, a deregistration result, or a query result through a user interaction interlace.
  • A Docker pull interface is used to download a container image from the private registry or the public registry based on a user requirement, and a process is as follows: The identifier of the user is authenticated through the Docker authentication interlace. If authentication is pass and the container image information database does not include the information about the container image, the container image is downloaded from the private registry or the public registry to local storage space of the service host. In addition, the Docker pull interlace may further add the information about the container image to the container image information database of the user.
  • A Docker commit interface is used to convert a container of the user to a private container image of the user, and a process is as follows: The identifier of the user is authenticated through the Docker authentication interface. If the authentication result is successful and the container image information database of the user exists on the service host, the container is converted into a container image and information about the container image is added to the container image information database of the user. In addition, the Docker commit interface may further save the converted container image in the local storage space of the service host.
  • A Docker container instance creation interface is used to create a container based on a user requirement, and a process is as follows: The identifier of the user is authenticated through the Docker authentication interface. If the authentication result is successful, it is determined whether the container image information database of the user exists on the service host. If the container image information database of the user exists, the required information about the container image is queried in the container image information database of the user. If the container image information database of the user includes the information about the container image, the container image is obtained based on the information about the container image. If the container image information database of the user does not include the information about the container image, the Docker pull interlace is invoked to download the container image from the private registry or the public registry to the service host. The container is created based on the container image. Alternatively, the information about the downloaded container image is added to the container image information database of the user, the information about the container image is obtained by using the container image information database of the user, the container image is obtained based on the information about the container image, and the container is created based on the container image.
  • A Docker push interface is used to upload a local container image to the private registry or the public registry, and a process is as follows: The identifier of the user is authenticated through the Docker authentication interface. If the authentication result is successful, the information about the container image is queried in the container image information database of the user. If the container image information database of the user includes the information about the container image, the container image is uploaded to the private registry or the public registry of the user.
  • A Docker container image information query interface is used to query, based on a user requirement, the information about the container image associated with the identifier of the user. Optionally, the Docker container image information query interface may query the information about the container image included in the container image information database of the user. Optionally, the Docker container image information query interface invokes Glance to query the information about the container image included in the private registry of the user. Optionally, the information about the container image is the identifier of the container image. Optionally, the Docker container image information query interface may further output the query result through the user interaction interlace.
  • In the OpenStack-based Docker container management system, one or more of the following container-related operations may be implemented:
  • container provisioning or deletion, container starting, container image management, and the like, where the container image management includes container image submission, container image downloading, container image viewing, and the like.
  • FIG. 7A and FIG. 7B show a flowchart of a container management method according to the present application. Using an example in which the method is used to provision a container in the OpenStack-based Docker container management system shown in FIG. 6, the method includes the following steps.
  • Step 701: Nova receives a container provisioning request through Nova API.
  • The container provisioning request is used to request to provision a third container. The container provisioning request includes at least an identifier of a first user initiating the container provisioning request and an identifier of a third container image, and the third container image is a container image required for provisioning the third container.
  • Optionally, the identifier of the first user may include an ID of the first user and/or a token of the first user, and the identifier of the third container image is an ID of the third container image and/or a name of the third container image.
  • Step 702: Nova invokes Keystone to authenticate the token of the first user. If an authentication result is successful, step 703 is performed.
  • Optionally, step 702 further includes: if the authentication result is failed, failing to provision the container.
  • Step 703: Nova invokes Nova scheduler to select a service host for provisioning the third container, and sends related information of the container provisioning request to Nova compute deployed on the service host.
  • Step 704: Nova compute invokes Glance to obtain an attribute of the third container image based on the identifier of the third container image.
  • Nova compute is deployed on the service host, and the attribute of the third container image is public or private.
  • Optionally, step 704 may further include: invoking, by Nova compute, Glance to obtain the name of the third container image based on the ID of the third container image.
  • Step 705: Nova compute invokes Docker, and sends the related information about the container provisioning request to Docker.
  • The related information of the container provisioning request includes but is not limited to the container provisioning request, the identifier of the first user, and the identifier of the third container image.
  • Step 706: Docker invokes Keystone to authenticate the token of the first user. If the authentication result is successful, step 707 is performed. If the authentication result is failed, the container fails to be provisioned.
  • Step 707: Docker invokes a Docker user management interface to check whether a container image information database of the first user exists. If the container image information database of the first user exists, step 708 is performed. If the container image information database of the first user does not exist, the container fails to be provisioned.
  • In an optional implementation, step 707 further includes: if the container image information database of the first user does not exist, failing to provision the container; feeding back, through Nova API, information that the container image information database of the first user does not exist to the first user; and triggering, by the first user, based on a feedback result of Nova API, to establish the container image information database of the first user. For an operation of establishing the container image information database of the first user, refer to step 501.
  • Step 708: Docker invokes a Docker container image information query interface to check whether information about the third container image exists in the container image information database of the first user. If the information about the third container image exists, step 709 is performed. If the information about the third container image does not exist, step 710 is performed.
  • Step 709: Docker obtains the information about the third container image and obtains the third container image based on the information about the third container image, and performs step 713.
  • Step 710: Docker determines the attribute of the third container image. If the attribute of the third container image is public, step 711 is performed. If the attribute of the third container image is private, step 712 is performed.
  • Step 711: Docker invokes a Docker pull interface to download the third container image from a public registry, and performs step 713.
  • Step 712: Docker invokes the Docker pull interface to download the third container image from a private registry of the first user, and performs step 713.
  • Step 713: Docker creates and provisions the third container based on the third container image.
  • In a possible implementation, steps 706 to 713 are implemented by invoking a Docker container instance creation interface by Docker.
  • In the present application, a container image information database corresponding to an identifier of a user is queried. After an identifier of a container image is found from the container image information database of the user, the container image is obtained based on the identifier of the container image, and a container is further provisioned based on the container image. In a container provisioning process, the container image information database of the user is queried, but a container image information database of another user is not queried. In this case, a container image of the another user is not obtained. This implements user-level isolation of user data in the container provisioning process, and ensures security of the user data.
  • In addition, an instruction, information, and/or data are/is sent to each module in an OpenStack system through a Docker interface in Docker, and functions such as user registration and user authentication in the OpenStack system may be used, to ensure the security of the user data in the Docker container management system.
  • FIG. 8 shows a flowchart of a container management method according to the present application. Using an example in which the method is used to manage a container image submission process in the OpenStack-based container management system shown in FIG. 6, the method includes the following steps.
  • Step 801: Nova receives a container image submission request through Nova API.
  • The container image submission request is used to request to convert a fourth container into a fourth container image and submit the fourth container image.
  • A container image submission request includes:
  • an identifier of a first user initiating the container image submission request and an identifier of a Docker container instance, where the identifier of the first user includes an ID of the first user and/or a token of the first user, and the identifier of the Docker container instance is an identifier of the Docker container instance in which the fourth container is located.
  • Step 802: Nova invokes Keystone to authenticate the token of the first user. If an authentication result is successful, step 803 is performed.
  • If the authentication result is failed, container image submission fails.
  • Step 803: Nova obtains, based on the identifier of the Docker container instance, an identifier of a service host on which the Docker container instance is located and an identifier of the fourth container.
  • Step 804: Nova sends related information about the container image submission request to Nova compute.
  • The related information about the container image submission request includes but is not limited to the container image submission request, the identifier of the first user, and the identifier of the fourth container.
  • Nova compute is deployed on the service host.
  • Step 805: Nova compute invokes Docker, and sends the related information of the container image submission request to Docker.
  • Step 806: Docker invokes Keystone to authenticate the token of the first user. If the authentication result is successful, step 807 is performed. If the authentication result is failed, container image submission fails.
  • Step 807: Docker invokes a Docker user management interface to check whether a container image information database of the first user exists. If the container image information database of the first user exists, step 808 is performed. If the container image information database of the first user does not exist, container image submission fails.
  • Step 808: Docker invokes a Docker commit interface to convert the fourth container into the fourth container image, and adds information about the fourth container image to the container image information database of the first user.
  • Step 809: Nova compute invokes Glance to create a Glance image.
  • The Glance image is an image of the fourth container image in Glance, so that Nova can use the Glance image for container provisioning on another service host.
  • Optionally, step 809 further includes: establishing a mapping relationship between an identifier of the Glance image and a name of the fourth container image.
  • Step 810: Docker invokes a Docker push interlace to upload the fourth container image to a private registry of the first user.
  • Optionally, step 810 includes: invoking the Docker push interface by Docker; invoking the Docker user management interface by the Docker push interface, to output the token of the first user to Keystone for authentication; and if the authentication result is successful, uploading the fourth container image to the private registry of the first user.
  • In this embodiment of the present application, a container of a user is converted into a container image, and an identifier of the container image is added to a container image information database of the user. In this case, the container image information database of the user includes the identifier of the container image of the user. The container image of the user in storage space of the service host can be obtained, but a container image of another user cannot be obtained. This implements user-level isolation of user data is implemented, and ensures security of the user data.
  • In addition, an instruction, information, and/or data are/is sent to each module in an OpenStack system through a Docker interface in Docker, and functions such as user registration and user authentication in the OpenStack system may be used, to ensure the security of the user data in the Docker container management system.
  • The foregoing describes in detail the container management methods provided in the embodiments of the present application with reference to FIG. 1 to FIG. 8. The following describes a container management apparatus and device provided in embodiments of the present application.
  • FIG. 9 shows a block diagram of a container management apparatus 900 according to the present application. The container management apparatus 900 includes an obtaining module 910, a query module 920, and a provisioning module 930.
  • The obtaining module 910 is configured to obtain a container provisioning request.
  • The container provisioning request carries an identifier of a first user and an identifier of a first container image.
  • The query module 920 is configured to query a container image information database corresponding to the identifier of the first user, where the container image information database is used to store a mapping relationship between the identifier of the first user and the first container image.
  • The provisioning module 930 is configured to: when the identifier of the first container image exists in the container image information database, obtain the first container image based on the identifier of the first container image, and provision a first container based on the first container image.
  • In an optional implementation, the provisioning module 930 is configured to: obtain information about the first container image based on the identifier of the first container image; and obtain the first container image from local storage space based on the information about the first container image, and start the first container based on the first container image.
  • In an optional implementation, the query module 920 is configured to: obtain an authentication result based on the identifier of the first user; and when the authentication result is successful, query the container image information database corresponding to the identifier of the first user.
  • In an optional implementation, the provisioning module 930 is further configured to: when the identifier of the first container image does not exist in the container image information database and an attribute of the first container image is private, obtain the first container image from a private container image repository of the first user; or when the identifier of the first container image does not exist in the container image information database and an attribute of the first container image is public, obtain the first container image from a public container image repository.
  • In an optional implementation, the container management apparatus 900 further includes:
  • a creation module, configured to register and create, based on the identifier of the first user, the container image information database corresponding to the identifier of the first user, where the container image information database includes one or more identifiers of one or more container images associated with the identifier of the first user.
  • In an optional embodiment, referring to FIG. 10, the container management apparatus 900 further includes:
  • a generation module 940, configured to generate a second container image based on the first container, where the second container image includes at least one of information about the first user, an application, and a driver;
  • an adding module 950, configured to add an identifier of the second container image to the container image information database of the first user; and
  • an uploading module 960, configured to upload the second container image to the private container image repository of the first user.
  • It should be understood that the container management apparatus 900 in the embodiments of the present application may be implemented by using an application-specific integrated circuit (ASIC), or a programmable logic device (PLD). The PLD may be a complex programmable logic device (CPLD), a field-programmable gate array (FPGA), a generic array logic (GAL), or any combination thereof. When the container management method shown in FIG. 4 or FIG. 5 is implemented by using software, the apparatus and the modules of the apparatus may also be software modules.
  • The container management apparatus 900 according to the embodiments of the present application may correspondingly perform the method described in the embodiments of the present application, and the foregoing and other operations and/or functions of the units in the container management apparatus 900 are separately used to implement corresponding procedures performed by the container engine in the method in FIG. 4 or FIG. 5. For brevity, details are not described herein.
  • In the present application, a container image information database corresponding to an identifier of a user is queried. After an identifier of a container image is found from the container image information database of the user, the container image is obtained based on the identifier of the container image, and a container is further provisioned based on the container image. In a container provisioning process, the container image information database of the user is queried, but a container image information database of another user is not queried. In this case, a container image of the another user is not obtained. This implements user-level isolation of user data in the container provisioning process, and ensures security of the user data.
  • In addition, the container of the user is converted into the container image, and the identifier of the container image is added to the container image information database of the user. In this case, the container image information database of the user includes the identifier of the container image of the user. This implements the user-level isolation of the user data and ensures the security of the user data.
  • FIG. 11 is a schematic structural diagram of a container management device according to an embodiment of the present application. The device may be a server or a terminal. As shown in FIG. 11, the container management device 1100 includes a processor 1101, a memory 1102, a communications interface 1103, a bus 1104, and a graphics processing unit 1105. The processor 1101, the memory 1102, the communications interface 1103, and the graphics processing unit 1105 communicate with each other by using the bus 1104, or may communicate with each other in another manner such as wireless transmission. The memory 1102 is configured to store an instruction, and the processor 1101 is configured to execute the instruction stored in the memory 1102. The memory 1102 stores program code, and the processor 1101 may invoke the program code stored in the memory 1102 to perform the following operations:
  • obtaining a container provisioning request, where the container provisioning request carries an identifier of a first user and an identifier of a first container image;
  • querying a container image information database corresponding to the identifier of the first user, where the container image information database is used to store a mapping relationship between the identifier of the first user and the first container image; and
  • when the identifier of the first container image exists in the container image information database, obtaining the first container image based on the identifier of the first container image, and provisioning a first container based on the first container image.
  • It should be understood that in this embodiment of the present application, the processor 1101 may be a CPU, or the processor 1101 may be another general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field-programmable gate array (FPGA), or another programmable logic device, discrete gate or transistor logic device, discrete hardware component, or the like. The general-purpose processor may be a microprocessor, any conventional processor, or the like. It should be noted that the processor 1101 may be a processor supporting an ARM architecture.
  • The memory 1102 may include a read-only memory and a random access memory, and provide an instruction and data for the processor 1101. The memory 1102 may further include a nonvolatile random access memory. For example, the memory 1102 may further store information of a device type.
  • The memory 1102 may be a volatile memory or a nonvolatile memory, or may include a volatile memory and a nonvolatile memory. The nonvolatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory. The volatile memory may be a random access memory (RAM), used as an external cache. Through example but not limitative description, many forms of RAMs may be used, for example, a static random access memory (SRAM), a dynamic random access memory (DRAM), a synchronous dynamic random access memory (SDRAM), a double data rate synchronous dynamic random access memory (DDR SDRAM), an enhanced synchronous dynamic random access memory (ESDRAM), a synchronous link dynamic random access memory (SLDRAM), and a direct rambus random access memory (DR RAM).
  • The bus 1104 may include a power bus, a control bus, a status signal bus, and the like, in addition to a data bus. However, for clear description, various types of buses in the figure are marked as the bus 1104.
  • It should be understood that the container management device 1100 according to this embodiment of the present application may correspond to the container management apparatus 900 shown in FIG. 9 or FIG. 10 in the embodiment of the present application, and may correspond to operation steps in which the container engine for performing the method shown in FIG. 4 or FIG. 5 in the embodiment of the present application is an execution body. In addition, the foregoing and other operations and/or functions of the modules in the container engine are separately used to implement corresponding procedures of the method in FIG. 4 or FIG. 5. For brevity, details are not described herein.
  • An embodiment of the present application further provides a non-transitory computer-readable storage medium. When an instruction in the storage medium is executed by a processor of a computing system, the computing system is enabled to perform the container management method provided in any one of FIG. 4, FIG. 5, FIG. 7A and FIG. 7B, or FIG. 8.
  • A computer program product including an instruction is provided. When the computer program product runs on a computer, the computer is enabled to execute the instruction for performing the container management method provided in any one of FIG. 4, FIG. 5, FIG. 7A and FIG. 7B, or FIG. 8.
  • All or some of the foregoing embodiments may be implemented by using software, hardware, firmware, or any combination thereof. When the software is used for implementation, all or some of the embodiments may be implemented in a form of a computer program product. The computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on an apparatus, the procedures or functions according to the embodiments of the present application are all or partially generated. The computer instructions may be stored in a computer-readable storage medium or may be transmitted from a computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center to another website, computer, server, or data center in a wired (for example, a coaxial optical cable, an optical fiber, or a digital subscriber line) or wireless (for example, infrared, radio, or microwave) manner. The computer-readable storage medium may be any usable medium accessible by an apparatus, or a data storage device, such as a server or a data center, integrating one or more usable media. The usable medium may be magnetic media (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a digital video disk (DVD)), semiconductor medium (for example, a solid-state drive), or the like.
  • The sequence numbers of the foregoing embodiments of the present application are merely for illustrative purposes, and are not intended to indicate priorities of the embodiments.
  • The foregoing descriptions are merely optional embodiments of this application, but are not intended to limit this application. Any modification, equivalent replacement, or improvement made without departing from the principle of this application should fall within the protection scope of this application.

Claims (20)

What is claimed is:
1. A method, comprising:
obtaining, by a container engine, a container provisioning request, wherein the container provisioning request carries an identifier of a first user and an identifier of a first container image;
querying, by the container engine, a container image information database corresponding to the identifier of the first user, wherein the container image information database stores a mapping relationship between the identifier of the first user and one or more container images; and
when the identifier of the first container image exists in the container image information database:
obtaining, by the container engine, the first container image based on the identifier of the first container image; and
provisioning, by the container engine, a first container based on the first container image.
2. The method according to claim 1, wherein the method further comprises:
before the obtaining the container provisioning request:
registering and creating, based on the identifier of the first user, the container image information database corresponding to the identifier of the first user, wherein the container image information database comprises one or more identifiers of the one or more container images associated with the identifier of the first user.
3. The method according to claim 1, wherein the obtaining the first container image comprises:
obtaining information about the first container image based on the identifier of the first container image; and
obtaining the first container image from local storage space based on the information about the first container image, and wherein the provisioning the first container comprises:
starting the first container based on the first container image.
4. The method according to claim 1, wherein the method further comprises:
when the identifier of the first container image does not exist in the container image information database and an attribute of the first container image is private, obtaining the first container image from a private container image repository of the first user.
5. The method according to claim 1, wherein the method further comprises:
when the identifier of the first container image does not exist in the container image information database and an attribute of the first container image is public, obtaining the first container image from a public container image repository.
6. The method according to claim 5, wherein the method further comprises:
after the obtaining the first container image and the provisioning the first container:
generating a second container image based on the first container, wherein the second container image comprises at least one of information about the first user, an application of the first user, or a driver of the first user;
adding an identifier of the second container image to the container image information database of the first user; and
uploading the second container image to a private container image repository of the first user.
7. The method according to claim 1, wherein the querying the container image information database comprises:
obtaining an authentication result based on the identifier of the first user; and
when the authentication result is successful, querying the container image information database corresponding to the identifier of the first user.
8. A container management device, comprising:
at least one processor; and
a memory, the memory stores at least one instruction, and the at least one processor loads and executes the at least one instruction to perform operations, the operations including:
obtaining a container provisioning request, wherein the container provisioning request carries an identifier of a first user and an identifier of a first container image;
querying a container image information database corresponding to the identifier of the first user, wherein the container image information database stores a mapping relationship between the identifier of the first user and one or more container images; and
when the identifier of the first container image exists in the container image information database:
obtaining the first container image based on the identifier of the first container image; and
provisioning a first container based on the first container image.
9. The container management device of claim 8, wherein the operations further include:
before the obtaining the container provisioning request:
registering and creating, based on the identifier of the first user, the container image information database corresponding to the identifier of the first user, wherein the container image information database comprises one or more identifiers of the one or more container images associated with the identifier of the first user.
10. The container management device of claim 8, wherein the obtaining the first container image based on the identifier of the first container image comprises:
obtaining information about the first container image based on the identifier of the first container image; and
obtaining the first container image from local storage space based on the information about the first container image, and wherein the provisioning the first container comprises:
starting the first container based on the first container image.
11. The container management device of claim 8, wherein the operations further include:
when the identifier of the first container image does not exist in the container image information database and an attribute of the first container image is private, obtaining the first container image from a private container image repository of the first user.
12. The container management device of claim 8, wherein the operations further include:
when the identifier of the first container image does not exist in the container image information database and an attribute of the first container image is public, obtaining the first container image from a public container image repository.
13. The container management device of claim 12, wherein the operations further include:
after the obtaining the first container image and the provisioning the first container:
generating a second container image based on the first container, wherein the second container image comprises at least one of information about the first user, an application of the first user, or a driver of the first user;
adding an identifier of the second container image to the container image information database of the first user; and
uploading the second container image to a private container image repository of the first user.
14. The container management device of claim 8, wherein the querying the container image information database comprises
obtaining an authentication result based on the identifier of the first user; and
when the authentication result is successful, querying the container image information database corresponding to the identifier of the first user.
15. A non-transitory computer-readable storage medium comprising instructions which, when executed by a computer, cause the computer to perform operations, the operations comprising:
obtaining a container provisioning request, wherein the container provisioning request carries an identifier of a first user and an identifier of a first container image;
querying a container image information database corresponding to the identifier of the first user, wherein the container image information database stores a mapping relationship between the identifier of the first user and one or more container images; and
when the identifier of the first container image exists in the container image information database:
obtaining the first container image based on the identifier of the first container image; and
provisioning a first container based on the first container image.
16. The non-transitory computer-readable storage medium of claim 15, the operations further comprising:
before the obtaining the container provisioning request:
registering and creating, based on the identifier of the first user, the container image information database corresponding to the identifier of the first user, wherein the container image information database comprises one or more identifiers of the one or more container images associated with the identifier of the first user.
17. The non-transitory computer-readable storage medium of claim 15, wherein the obtaining the first container image comprises :
obtaining information about the first container image based on the identifier of the first container image; and
obtaining the first container image from local storage space based on the information about the first container image, and wherein the provisioning the first container comprises:
starting the first container based on the first container image.
18. The non-transitory computer-readable storage medium of claim 15, the operations further comprising:
when the identifier of the first container image does not exist in the container image information database and an attribute of the first container image is private, obtaining the first container image from a private container image repository of the first user.
19. The non-transitory computer-readable storage medium of claim 15, the operations further comprising:
when the identifier of the first container image does not exist in the container image information database and an attribute of the first container image is public, obtaining the first container image from a public container image repository.
20. The non-transitory computer-readable storage medium of claim 19, the operations further comprising:
after the obtaining the first container image and the provisioning the first container:
generating a second container image based on the first container, wherein the second container image comprises at least one of information about the first user, an application of the first user, or a driver of the first user;
adding an identifier of the second container image to the container image information database of the first user; and
uploading the second container image to a private container image repository of the first user.
US17/117,698 2018-06-29 2020-12-10 Container Management Method, Apparatus, and Device Pending US20210097476A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201810713108.3A CN110659100B (en) 2018-06-29 2018-06-29 Container management method, device and equipment
CN201810713108.3 2018-06-29
PCT/CN2019/085509 WO2020001162A1 (en) 2018-06-29 2019-05-05 Container management method, apparatus, and device

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/085509 Continuation WO2020001162A1 (en) 2018-06-29 2019-05-05 Container management method, apparatus, and device

Publications (1)

Publication Number Publication Date
US20210097476A1 true US20210097476A1 (en) 2021-04-01

Family

ID=68984888

Family Applications (1)

Application Number Title Priority Date Filing Date
US17/117,698 Pending US20210097476A1 (en) 2018-06-29 2020-12-10 Container Management Method, Apparatus, and Device

Country Status (4)

Country Link
US (1) US20210097476A1 (en)
EP (1) EP3796616A4 (en)
CN (1) CN110659100B (en)
WO (1) WO2020001162A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210294624A1 (en) * 2020-03-23 2021-09-23 Nubix, Inc. Method for deploying containerized protocols on very small devices
US20220253342A1 (en) * 2021-02-09 2022-08-11 Red Hat, Inc. Dynamic containerized content delivery
CN115129429A (en) * 2022-09-01 2022-09-30 南京翼辉爱智物联技术有限公司 Container application management method and device, electronic equipment and storage medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111966445B (en) * 2020-06-30 2023-07-25 北京百度网讯科技有限公司 Processing method and device for calling application program interface
CN114579520B (en) * 2022-03-04 2023-05-05 北京百度网讯科技有限公司 Mirror image data processing method, mirror image data loading method and device

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060218164A1 (en) * 2005-03-23 2006-09-28 Fujitsu Limited Document management device and document management program
US20130097275A1 (en) * 2011-10-14 2013-04-18 Verizon Patent And Licensing Inc. Cloud-based storage deprovisioning
US20160371108A1 (en) * 2015-06-16 2016-12-22 Vmware, Inc. Reservation for a multi-machine application
US20180124055A1 (en) * 2016-10-31 2018-05-03 Red Hat, Inc. Decoupling container image layers to preserve privacy
US20180225155A1 (en) * 2017-02-08 2018-08-09 Dell Products L.P. Workload optimization system
US20180349168A1 (en) * 2017-05-30 2018-12-06 Magalix Corporation Systems and methods for managing a cloud computing environment
US20190068706A1 (en) * 2017-08-22 2019-02-28 Red Hat, Inc. Data auditing for object storage public clouds
US20190146772A1 (en) * 2017-11-14 2019-05-16 Red Hat, Inc. Managing updates to container images
US20190205408A1 (en) * 2018-01-04 2019-07-04 Red Hat, Inc. System And Method For Generating Container Image Suggestions

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6954930B2 (en) * 2002-02-19 2005-10-11 International Business Machines Corporation Remote validation of installation input data
US8429540B1 (en) * 2008-10-10 2013-04-23 Adobe Systems Incorporated End user created collaborative and non-collaborative workspace application container system and method
CN106487850B (en) * 2015-08-29 2019-10-25 华为技术有限公司 The methods, devices and systems of mirror image are obtained under a kind of cloud environment
US10032032B2 (en) * 2015-12-18 2018-07-24 Amazon Technologies, Inc. Software container registry inspection
CN107819802B (en) * 2016-09-13 2021-02-26 华为技术有限公司 Mirror image obtaining method in node cluster, node equipment and server
US10303657B2 (en) * 2016-09-30 2019-05-28 International Business Machines Corporation Docker layer deduplication with layer referencing
CN106874357B (en) * 2016-12-28 2020-02-11 新华三技术有限公司 Resource customization method and device for Web application
CN107229507A (en) * 2017-05-31 2017-10-03 郑州云海信息技术有限公司 A kind of container mirror image construction method and device
CN107643940A (en) * 2017-09-26 2018-01-30 华为技术有限公司 Container creation method, relevant device and computer-readable storage medium
US10922118B2 (en) * 2018-05-11 2021-02-16 International Business Machines Corporation Distributed container image repository service
CN109656686A (en) * 2018-12-17 2019-04-19 武汉烽火信息集成技术有限公司 The upper deployment container cloud method of OpenStack, storage medium, electronic equipment and system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060218164A1 (en) * 2005-03-23 2006-09-28 Fujitsu Limited Document management device and document management program
US20130097275A1 (en) * 2011-10-14 2013-04-18 Verizon Patent And Licensing Inc. Cloud-based storage deprovisioning
US20160371108A1 (en) * 2015-06-16 2016-12-22 Vmware, Inc. Reservation for a multi-machine application
US20180124055A1 (en) * 2016-10-31 2018-05-03 Red Hat, Inc. Decoupling container image layers to preserve privacy
US20180225155A1 (en) * 2017-02-08 2018-08-09 Dell Products L.P. Workload optimization system
US20180349168A1 (en) * 2017-05-30 2018-12-06 Magalix Corporation Systems and methods for managing a cloud computing environment
US20190068706A1 (en) * 2017-08-22 2019-02-28 Red Hat, Inc. Data auditing for object storage public clouds
US20190146772A1 (en) * 2017-11-14 2019-05-16 Red Hat, Inc. Managing updates to container images
US20190205408A1 (en) * 2018-01-04 2019-07-04 Red Hat, Inc. System And Method For Generating Container Image Suggestions

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210294624A1 (en) * 2020-03-23 2021-09-23 Nubix, Inc. Method for deploying containerized protocols on very small devices
US11875167B2 (en) * 2020-03-23 2024-01-16 Nubix, Inc. Method for deploying containerized protocols on very small devices
US20220253342A1 (en) * 2021-02-09 2022-08-11 Red Hat, Inc. Dynamic containerized content delivery
CN115129429A (en) * 2022-09-01 2022-09-30 南京翼辉爱智物联技术有限公司 Container application management method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
WO2020001162A1 (en) 2020-01-02
CN110659100A (en) 2020-01-07
EP3796616A4 (en) 2021-07-21
EP3796616A1 (en) 2021-03-24
CN110659100B (en) 2022-05-24

Similar Documents

Publication Publication Date Title
US20210097476A1 (en) Container Management Method, Apparatus, and Device
KR102209276B1 (en) Messaging protocol communication management
CN111258725B (en) Data processing method, device, equipment and medium based on block chain
US11138030B2 (en) Executing code referenced from a microservice registry
US10515058B2 (en) Unified file and object data storage
US9672053B2 (en) Service request processing
US20190089810A1 (en) Resource access method, apparatus, and system
US10678657B1 (en) Reversion operations for virtual computing environments
WO2016131171A1 (en) Operation method and device for vnf package
KR102561083B1 (en) Profile-based content and services
US20150373011A1 (en) Credential collection in an authentication server employing diverse authentication schemes
US9350738B2 (en) Template representation of security resources
CN115048642B (en) Communication method between trusted applications in multi-trusted execution environment and electronic equipment
US10785056B1 (en) Sharing a subnet of a logically isolated network between client accounts of a provider network
CN113923023A (en) Authority configuration and data processing method, device, electronic equipment and medium
WO2021232860A1 (en) Communication method, apparatus and system
JP2022501733A (en) Data management methods and devices and servers
CN112738181B (en) Method, device and server for cluster external IP access
CN108140095B (en) Distributed big data security architecture
US11546324B1 (en) Single use execution environment with scoped credentials for on-demand code execution
US10911371B1 (en) Policy-based allocation of provider network resources
CN109739615B (en) Mapping method and device of virtual hard disk and cloud computing platform
US8806589B2 (en) Credential collection in an authentication server employing diverse authentication schemes
CN110716764A (en) Sharing method and device of public configuration, computer equipment and storage medium
US11853560B2 (en) Conditional role decision based on source environments

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: APPLICATION DISPATCHED FROM PREEXAM, NOT YET DOCKETED

AS Assignment

Owner name: HUAWEI TECHNOLOGIES CO., LTD., CHINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DING, WENQIANG;LI, JUAN;XU, QISHUAI;SIGNING DATES FROM 20201215 TO 20210729;REEL/FRAME:057021/0551

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED